|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Yinguo Qiu, Jiuyun Sun and Jiaojue Zheng
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
Qianwen Zhou, Changqing Zhu and Na Ren
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on ...
ver más
|
|
|
|
|
|
|
El-Sayed M. El-Kenawy, Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim and Abdelaziz A. Abdelhamid
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to di...
ver más
|
|
|
|
|
|
|
Fahmi Amhar, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, Shelvie Nidya Neyman, Anggrahito, Dadan Ramdani, Danang Jaya, Dewayany Sutrisno, Sandi Adhitya Kolopaking, Tia Rizka Nuzula Rachma and Murdaningsih
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the tw...
ver más
|
|
|
|
|
|
|
Qifei Zhou, Changqing Zhu and Na Ren
How to keep the fidelity of the digital elevation model (DEM) data is a crucial problem in the current watermarking research, as the watermarked DEM data need to preserve their accuracy. We proposed a zero watermarking method for the triangulated irregul...
ver más
|
|
|
|
|
|
|
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo...
ver más
|
|
|
|
|
|
|
Qifei Zhou, Na Ren, Changqing Zhu and A-Xing Zhu
Projection transformation is an important part of geographic analysis in geographic information systems, which are particularly common for vector geographic data. However, achieving resistance to projection transformation attacks on watermarking for vect...
ver más
|
|
|
|
|
|
|
Yingying Wang, Chengsong Yang, Changqing Zhu and Kaimeng Ding
Vector geographic data play an important role in location information services. Digital watermarking has been widely used in protecting vector geographic data from being easily duplicated by digital forensics. Because the production and application of ve...
ver más
|
|
|
|